The encryption - decryption of the column level for a commercial DBMS with supporting user interface
The main purpose of the project was to develop an improvement of the database column level encryption implementation. The Small and medium size enterprises (SMEs) need to secure their valuable database from intrusion by unauthorized personnel economically. Nevertheless, they have identified a need f...
| Main Author: | Elfadil, Sabeil Mohamed Ali |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9765/ http://eprints.utm.my/9765/1/ElfadilSabeiMohamedMFSKSM2009.pdf |
Similar Items
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Graphical user interfaces
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Culture and user-interface design for older users in Malaysia
by: Hisham, Syariffanor, et al.
Published: (2007)
by: Hisham, Syariffanor, et al.
Published: (2007)
The effect of switching and cycle-to-cycle variations of RRAM on 4-bit encryption/decryption process
by: Nivetha, T., et al.
Published: (2024)
by: Nivetha, T., et al.
Published: (2024)
NGG Notes Graphics user interface Gallery / Leong Pek Ling
by: Leong , Pek Ling
Published: (1999)
by: Leong , Pek Ling
Published: (1999)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Designing the user interface : recommendations for effective online game interface design focusing on early adult's user / Maziani Malek
by: Malek, Maziani
Published: (2006)
by: Malek, Maziani
Published: (2006)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
The impact of non-diegetic user interface design on player experience in Puzzle games
by: Leong, Wan Yi
Published: (2024)
by: Leong, Wan Yi
Published: (2024)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
ARM7 Processor Simulator with Graphical User Interface
by: Khaw, Boon Chai, et al.
Published: (2007)
by: Khaw, Boon Chai, et al.
Published: (2007)
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018)
by: Mohammed Ismael, Saba
Published: (2018)
Bridging the gap between user requirements and user interface design / Bainaiah Misiran
by: Misiran, Bainaiah
Published: (2005)
by: Misiran, Bainaiah
Published: (2005)
An implementation of natural language user interface in smart home system / Ngoi Se Keng
by: Ngoi , Se Keng
Published: (2010)
by: Ngoi , Se Keng
Published: (2010)
Investigation of the role of individual's gender in the design of graphical user interface for mobile learning device
by: Ling, Thong Chee, et al.
Published: (2020)
by: Ling, Thong Chee, et al.
Published: (2020)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Collaborative usage of ICT DBMS in construction cost control: requirements for development and users perception
by: Bandi, Shamsul Hadi
Published: (2008)
by: Bandi, Shamsul Hadi
Published: (2008)
3D solids and their management in DBMS
by: Chen, Tet Khuan, et al.
Published: (2007)
by: Chen, Tet Khuan, et al.
Published: (2007)
Supporting Maintenance of Web Applications Using User-Centered Technique
by: Siti Nor Asikin, Kamalzaman, et al.
Published: (2012)
by: Siti Nor Asikin, Kamalzaman, et al.
Published: (2012)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Real time actions and gestures as intuitive user interface for creative 3D modeling
by: Looi, N.K., et al.
Published: (2005)
by: Looi, N.K., et al.
Published: (2005)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
Interfaces and protocols
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
An interface of wireless network traffic analysis
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
Improvement of user interface for restaurant Point of Sale(POS) system from text based interface to graphical icon interface / Mohd Firdaus Mad Shah
by: Mad Shah, Mohd Firdaus
Published: (2006)
by: Mad Shah, Mohd Firdaus
Published: (2006)
An adaptive user interface model for enhancing usability and performance efficiency of diabetes mobile applications / Chew Sook Peng
by: Chew , Sook Peng
Published: (2022)
by: Chew , Sook Peng
Published: (2022)
Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin
by: Husam , N. S. Yasin
Published: (2021)
by: Husam , N. S. Yasin
Published: (2021)
A comparative study to analyze bone : CT data
by: Elfadil, Aboubaker Abbas
Published: (2008)
by: Elfadil, Aboubaker Abbas
Published: (2008)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
A practical and user friendly interface of fuzzy logic rule based system for maintenance policy decision making
by: Hasan Basari, Abd. Samad, et al.
Published: (2008)
by: Hasan Basari, Abd. Samad, et al.
Published: (2008)
Neuro: physiological interface
by: Abdul Rahman, Abdul Wahab
Published: (2018)
by: Abdul Rahman, Abdul Wahab
Published: (2018)
Similar Items
-
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004) -
Graphical user interfaces
by: Shah, Asadullah, et al.
Published: (2011) -
Culture and user-interface design for older users in Malaysia
by: Hisham, Syariffanor, et al.
Published: (2007) -
The effect of switching and cycle-to-cycle variations of RRAM on 4-bit encryption/decryption process
by: Nivetha, T., et al.
Published: (2024)